Optimizing Targeting of Intrusion Detection Systems in Social Networks

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].
Original languageEnglish
Title of host publicationHandbook of Social Network Technologies and Applications
EditorsBorko Furht
PublisherSpringer
Pages549-568
ISBN (Electronic)978-1-4419-7142-5
ISBN (Print)978-1-4419-7141-8
DOIs
StatePublished - 15 Oct 2010

Fingerprint

Dive into the research topics of 'Optimizing Targeting of Intrusion Detection Systems in Social Networks'. Together they form a unique fingerprint.

Cite this